One Article Review

Accueil - L'article:
Source SecurityWeek.webp SecurityWeek
Identifiant 2684085
Date de publication 2021-04-23 16:56:47 (vue: 2021-04-23 17:05:13)
Titre Tor-Based Linux Botnet Abuses IaC Tools to Spread
Texte A recently observed malware botnet targeting Linux systems is employing many of the emerging techniques among cyber-criminals, such as the use of Tor proxies, legitimate DevOps tools, and the removal of competing malware, according to new research from anti-malware vendor Trend Micro.
Notes
Envoyé Oui
Condensat abuses according among anti based botnet competing criminals cyber devops emerging employing from iac legitimate linux malware many micro new observed proxies recently removal research spread such systems targeting techniques tools tor trend use vendor
Tags Malware
Stories
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: